Person
Dr.-Ing., UniversitätsprofessorinUlrike Meyer
Lehr- und Forschungsgebiet IT-Sicherheit
Address
Building: UMIC Research Centre
Room: 208
Mies-van-der-Rohe-Str. 15
52074 Aachen
Contact
- WorkPhone
- Phone: +49 241 80 20783
Fax
Fax:
+49 241 80 22731
Email:
meyer@itsec.rwth-aachen.de
Publications
Title | Author(s) |
---|---|
Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation Contribution to a book, Contribution to a conference proceedings (2023) | Klinger, Andreas Gabriel (Corresponding author) Battermann, Felix Meyer, Ulrike |
Privacy-Preserving Fully Online Matching with Deadlines Contribution to a book, Contribution to a conference proceedings (2023) | Klinger, Andreas Gabriel (Corresponding author) Meyer, Ulrike |
More Than Meets the Eye - An Anti-Phishing Learning Game with a Focus on Phishing Emails Contribution to a book, Contribution to a conference proceedings (2022) | Röpke, René (Corresponding author) Drury, Vincent Jakob Peess, Philipp Johnen, Tobias Meyer, Ulrike Schroeder, Ulrik |
Wenn der eigene Spender nicht passt … Nierentransplantation als Cross-over-Lebendnierenspende Journal Article (2022) | Breuer, Malte Meyer, Ulrike Wetzel, Susanne Flöge, Jürgen Mühlfeld, Anja Susanne (Corresponding author) |
Secure Maximum Weight Matching Approximation on General Graphs Contribution to a book, Contribution to a conference proceedings (2022) | Brüggemann, Andreas (Corresponding author) Breuer, Malte (Corresponding author) Klinger, Andreas Gabriel (Corresponding author) Schneider, Thomas (Corresponding author) Meyer, Ulrike (Corresponding author) |
Analyzing and Creating Malicious URLs: A Comparative Study on Anti-Phishing Learning Games Contribution to a book, Contribution to a conference proceedings (2022) | Drury, Vincent Jakob (Corresponding author) Röpke, René (Corresponding author) Schroeder, Ulrik (Corresponding author) Meyer, Ulrike (Corresponding author) |
Exploring and Evaluating Different Game Mechanics for Anti-Phishing Learning Games Journal Article (2022) | Röpke, René (Corresponding author) Drury, Vincent Jakob Meyer, Ulrike Schroeder, Ulrik |
Accurate Real-Time Labeling of Application Traffic Contribution to a book, Contribution to a conference proceedings (2022) | Schäfer, Sebastian (Corresponding author) Löbel, Alexander (Corresponding author) Meyer, Ulrike (Corresponding author) |
Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming Contribution to a book, Contribution to a conference proceedings (2022) | Breuer, Malte (Corresponding author) Hein, Pascal (Corresponding author) Pompe, Leonardo (Corresponding author) Temme, Ben Clemens (Corresponding author) Meyer, Ulrike (Corresponding author) Wetzel, Susanne (Corresponding author) |
Dating Phish : An Analysis of the Life Cycles of Phishing Attacks and Campaigns Contribution to a book, Contribution to a conference proceedings (2022) | Drury, Vincent Jakob (Corresponding author) Lux, Luisa (Corresponding author) Meyer, Ulrike (Corresponding author) |
Detecting Unknown DGAs without Context Information Contribution to a book, Contribution to a conference proceedings (2022) | Drichel, Arthur (Corresponding author) von Brandt, Justus (Corresponding author) Meyer, Ulrike (Corresponding author) |
Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange Contribution to a book, Contribution to a conference proceedings (2022) | Breuer, Malte (Corresponding author) Meyer, Ulrike (Corresponding author) Wetzel, Susanne (Corresponding author) |
Better the Phish You Know : Evaluating Personalization in Anti-Phishing Learning Games Contribution to a book, Contribution to a conference proceedings (2022) | Röpke, René (Corresponding author) Drury, Vincent Jakob (Corresponding author) Meyer, Ulrike Schroeder, Ulrik |
The More, the Better? A Study on Collaborative Machine Learning for DGA Detection Contribution to a book, Contribution to a conference proceedings (2021) | Drichel, Arthur (Corresponding author) Holmes, Benedikt (Corresponding author) von Brandt, Justus (Corresponding author) Meyer, Ulrike (Corresponding author) |
Towards Privacy-Preserving Classification-as-a-Service for DGA Detection Contribution to a book, Contribution to a conference proceedings (2021) | Drichel, Arthur (Corresponding author) Gurabi, Mehdi Akbari (Corresponding author) Amelung, Tim (Corresponding author) Meyer, Ulrike (Corresponding author) |
Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice Contribution to a book, Contribution to a conference proceedings (2021) | Breuer, Malte (Corresponding author) Meyer, Ulrike (Corresponding author) Wetzel, Susanne (Corresponding author) |
Exploring Different Game Mechanics for Anti-phishing Learning Games Contribution to a book, Contribution to a conference proceedings (2021) | Röpke, René (Corresponding author) Drury, Vincent Jakob Meyer, Ulrike Schroeder, Ulrik |
Sharing FANCI Features : A Privacy Analysis of Feature Extraction for DGA Detection Contribution to a book, Contribution to a conference proceedings (2021) | Holmes, Benedikt (Corresponding author) Drichel, Arthur (Corresponding author) Meyer, Ulrike (Corresponding author) |
Hierarchical and Dynamic Threshold Paillier Cryptosystem without Trusted Dealer Journal Article (2021) | Klinger, Andreas Gabriel (Corresponding author) Wüller, Stefan (Corresponding author) Traverso, Giulia (Corresponding author) Meyer, Ulrike (Corresponding author) |
First Step Towards EXPLAINable DGA Multiclass Classification Contribution to a book, Contribution to a conference proceedings (2021) | Drichel, Arthur (Corresponding author) Faerber, Nils (Corresponding author) Meyer, Ulrike (Corresponding author) |
Finding Phish in a Haystack : A Pipeline for Phishing Classification on Certificate Transparency Logs Contribution to a book, Contribution to a conference proceedings (2021) | Drichel, Arthur (Corresponding author) Drury, Vincent Jakob (Corresponding author) von Brandt, Justus (Corresponding author) Meyer, Ulrike (Corresponding author) |
Towards Secure Evaluation of Online Functionalities Contribution to a book, Contribution to a conference proceedings (2021) | Klinger, Andreas Gabriel (Corresponding author) Meyer, Ulrike (Corresponding author) |
A Modular Architecture for Personalized Learning Content in Anti-Phishing Learning Games Contribution to a book, Contribution to a conference proceedings (2021) | Röpke, René (Corresponding author) Drury, Vincent Jakob (Corresponding author) Schroeder, Ulrik Meyer, Ulrike |
A Privacy-Preserving Protocol for the Kidney Exchange Problem Contribution to a book, Contribution to a conference proceedings (2020) | Breuer, Malte (Corresponding author) Meyer, Ulrike (Corresponding author) Wetzel, Susanne (Corresponding author) Mühlfeld, Anja Susanne (Corresponding author) |
A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education Contribution to a book, Contribution to a conference proceedings (2020) | Röpke, René (Corresponding author) Köhler, Klemens (Corresponding author) Drury, Vincent Jakob (Corresponding author) Schroeder, Ulrik Wolf, Martin Meyer, Ulrike |
No Phishing With the Wrong Bait: Reducing the Phishing Risk by Address Separation Contribution to a book, Contribution to a conference proceedings (2020) | Drury, Vincent Jakob (Corresponding author) Meyer, Ulrike (Corresponding author) |
Making Use of NXt to Nothing: The Effect of Class Imbalances on DGA Detection Classifiers Contribution to a book, Contribution to a conference proceedings (2020) | Drichel, Arthur (Corresponding author) Meyer, Ulrike (Corresponding author) Schüppen, Samuel (Corresponding author) Teubert, Dominik (Corresponding author) |
Analyzing the Real-World Applicability of DGA Classifiers Contribution to a book, Contribution to a conference proceedings (2020) | Drichel, Arthur (Corresponding author) Meyer, Ulrike (Corresponding author) Schüppen, Samuel (Corresponding author) Teubert, Dominik (Corresponding author) |
Towards Personalized Game-Based Learning in Anti-Phishing Education Contribution to a book, Contribution to a conference proceedings (2020) | Röpke, René (Corresponding author) Schroeder, Ulrik (Corresponding author) Drury, Vincent Jakob (Corresponding author) Meyer, Ulrike (Corresponding author) |
Hierarchical and Dynamic Threshold Paillier Cryptosystem without Trusted Dealer Conference Presentation (2020) | Klinger, Andreas Gabriel Wüller, Stefan Traverso, Giulia Meyer, Ulrike |
Privacy : Preserving Multi-Party Conditional Random Selection Contribution to a book, Contribution to a conference proceedings (2019) | Wüller, Stefan Assadsolimani, Benjamin Meyer, Ulrike Forg, Fabian Wetzel, Susanne |
Certified Phishing : Taking a Look at Public Key Certificates of Phishing Websites Contribution to a book, Contribution to a conference proceedings (2019) | Drury, Vincent Jakob (Corresponding author) Meyer, Ulrike (Corresponding author) |
FANCI : Feature-based Automated NXDomain Classification and Intelligence Contribution to a book, Contribution to a conference proceedings (2018) | Schüppen, Samuel Teubert, Dominik Hermann, Patrick Meyer, Ulrike |
Privacy-Preserving Trade Chain Detection Contribution to a book, Contribution to a conference proceedings (2018) | Wüller, Stefan (Corresponding author) Breuer, Malte Meyer, Ulrike Wetzel, Susanne |
Privacy-Preserving Subgraph Checking Contribution to a book, Contribution to a conference proceedings (2018) | Wüller, Stefan (Corresponding author) Assadsolimani, Benjamin Meyer, Ulrike (Corresponding author) Wetzel, Susanne (Corresponding author) |
Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries Contribution to a book, Contribution to a conference proceedings (2017) | Wüller, Stefan Meyer, Ulrike Wetzel, Susanne (Corresponding author) |
Hugin : a Scalable Hybrid Android Malware Detection System Contribution to a book, Contribution to a conference proceedings (2017) | Teubert, Dominik (Corresponding author) Krude, Johannes Schueppen, Samuel Meyer, Ulrike (Corresponding author) |
Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering Contribution to a book, Contribution to a conference proceedings (2017) | Foerg, Fabian (Corresponding author) Wetzel, Susanne (Corresponding author) Meyer, Ulrike (Corresponding author) |
Towards Privacy-Preserving Multi-party Bartering Contribution to a book, Contribution to a conference proceedings (2017) | Wüller, Stefan (Corresponding author) Meyer, Ulrike Wetzel, Susanne |
Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities Contribution to a book, Contribution to a conference proceedings (2017) | Wüller, Stefan (Corresponding author) Vu, Michael (Corresponding author) Meyer, Ulrike (Corresponding author) Wetzel, Susanne (Corresponding author) |
Beyond Lockdown: Towards Reliable e-Assessment Contribution to a book, Contribution to a conference proceedings (2017) | Küppers, Bastian (Corresponding author) Kerber, Florian Alexander (Corresponding author) Meyer, Ulrike (Corresponding author) Schroeder, Ulrik (Corresponding author) |
Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques Journal Article (2017) | Wüller, Stefan (Corresponding author) Mayer, Daniel Förg, Fabian Schüppen, Samuel Assadsolimani, Benjamin Meyer, Ulrike Wetzel, Susanne |
Anomaly-based Mobile Malware Detection: System Calls as Source for Features Contribution to a book, Contribution to a conference proceedings (2016) | Teubert, Dominik (Corresponding author) Grossmann, Fred Meyer, Ulrike (Corresponding author) |
Information Hiding in the RSA Modulus Contribution to a book, Contribution to a conference proceedings (2016) | Wüller, Stefan (Corresponding author) Kühnel, Marián Meyer, Ulrike (Corresponding author) |
Privacy-preserving two-party bartering secure against active adversaries Contribution to a book, Contribution to a conference proceedings (2016) | Wüller, Stefan (Corresponding author) Pessin, Wadim (Corresponding author) Meyer, Ulrike (Corresponding author) Wetzel, Susanne (Corresponding author) |
B. A. T. M. A. N. Handover Extension for Routing Nodes in Infrastructure WMNs Contribution to a book, Contribution to a conference proceedings (2016) | Herrmann, Patrick (Corresponding author) Meyer, Ulrike (Corresponding author) |
Classification of Short Messages Initiated by Mobile Malware Contribution to a book, Contribution to a conference proceedings (2016) | Kühnel, Marián (Corresponding author) Meyer, Ulrike (Corresponding author) |
Applying highly space efficient blacklisting to mobile malware Journal Article (2016) | Kühnel, Marián (Corresponding author) Meyer, Ulrike (Corresponding author) |
Covert remote syscall communication at kernel level : A SPOOKY backdoor Contribution to a book, Contribution to a conference proceedings (2015) | Kerber, Florian Alexander (Corresponding author) Teubert, Dominik Meyer, Ulrike (Corresponding author) |
Fast Identification of Obfuscation and Mobile Advertising in Mobile Malware Contribution to a book, Contribution to a conference proceedings (2015) | Kühnel, Marián (Corresponding author) Smieschek, Manfred Meyer, Ulrike |
4GMOP: Mopping Malware Initiated SMS Traffic in Mobile Networks Contribution to a book, Contribution to a conference proceedings (2015) | Kühnel, Marián (Corresponding author) Meyer, Ulrike |
Privacy-preserving conditional random selection Contribution to a book, Contribution to a conference proceedings (2015) | Wüller, Stefan Meyer, Ulrike Forg, Fabian Wetzel, Susanne |
Multi-operator wireless mesh networks secured by an all-encompassing security architecture Journal Article (2014) | Egners, André (Corresponding author) Herrmann, Patrick Meyer, Ulrike |
A secure two-party bartering protocol using privacy-preserving interval operations Contribution to a book, Contribution to a conference proceedings (2014) | Förg, Fabian Mayer, Daniel Wetzel, Susanne Wüller, Stefan Meyer, Ulrike |
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model Contribution to a book (2014) | Neugebauer, Georg (Corresponding author) Brutschy, Lucas Meyer, Ulrike Wetzel, Susanne |
Highly Space Efficient Blacklisting Contribution to a book (2014) | Kühnel, Marián (Corresponding author) Meyer, Ulrike |
Experiences from security research using a Wireless Mesh Network testbed Contribution to a book, Contribution to a conference proceedings (2013) | Egners, André Herrmann, Patrick Jarmuzek, Tobias Meyer, Ulrike |
Secure Roaming and Infrastructure Sharing for Multi-operator WMNs Contribution to a book, Contribution to a conference proceedings (2013) | Egners, André Meyer, Ulrike |
A Versatile Code Execution Isolation Framework with Security First Contribution to a book, Contribution to a conference proceedings (2013) | Krude, Johannes (Corresponding author) Meyer, Ulrike (Corresponding author) |
Design and Implementation of Privacy-preserving Reconciliation Protocols Contribution to a book, Contribution to a conference proceedings (2013) | Neugebauer, Georg Brutschy, Lucas Meyer, Ulrike Wetzel, Susanne |
IP agnostic real-time traffic filtering and host identification using TCP timestamps Contribution to a book, Contribution to a conference proceedings (2013) | Wicherski, Georg (Corresponding author) Weingarten, Florian (Corresponding author) Meyer, Ulrike (Corresponding author) |
SMC-MuSe: A Framework for Secure Multi-Party Computation on MultiSets Journal Article (2013) | Neugebauer, Georg Meyer, Ulrike Wetzel, Susanne |
Secure and efficient handover protocols for WMNs Contribution to a book, Contribution to a conference proceedings (2013) | Egners, André (Corresponding author) Herrmann, Patrick (Corresponding author) Meyer, Ulrike (Corresponding author) |
Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption Contribution to a book (2013) | Weingarten, Florian (Corresponding author) Neugebauer, Georg (Corresponding author) Meyer, Ulrike (Corresponding author) Wetzel, Susanne (Corresponding author) |
FSASD: A framework for establishing security associations for sequentially deployed WMN Contribution to a book, Contribution to a conference proceedings (2012) | Egners, André Fabelje, Hendrik Meyer, Ulrike |
A Privacy Preserving Range Extension for Commercial WLANs with User Incentives Contribution to a book, Contribution to a conference proceedings (2012) | Barnickel, Johannes Meyer, Ulrike |
Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode Contribution to a book, Contribution to a conference proceedings (2012) | Barnickel, Johannes Wang, Jian Meyer, Ulrike |
Messing with Androids Permission Model Contribution to a book, Contribution to a conference proceedings (2012) | Egners, André (Corresponding author) Meyer, Ulrike (Corresponding author) Marschollek, Björn (Corresponding author) |
GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library Contribution to a book (2012) | Gilger, Johannes (Corresponding author) Barnickel, Johannes (Corresponding author) Meyer, Ulrike (Corresponding author) |
Hackers in Your Pocket: A Survey of Smartphone Security Across Platforms Book (2012) | Egners, André Marschollek, Björn Meyer, Ulrike |
Introducing SOR : SSH-based Onion Routing Contribution to a book, Contribution to a conference proceedings (2012) | Egners, André Gatzen, Dominic Panchenko, Andriy Meyer, Ulrike |
Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version) Report (2011) | Neugebauer, Georg Meyer, Ulrike Wetzel, Susanne |
Security and Privacy Implications of URL Shortening Services Conference Presentation (2011) | Neumann, Alexander Barnickel, Johannes Meyer, Ulrike |
Fair and privacy-preserving multi-party protocols for reconciling ordered input sets Contribution to a book, Contribution to a conference proceedings (2011) | Neugebauer, Georg Meyer, Ulrike Wetzel, Susanne |
Security and privacy for WLAN roaming with per-connection tariff negotiation Contribution to a book, Contribution to a conference proceedings (2011) | Barnickel, Johannes Meyer, Ulrike |
Enabling fair and privacy-preserving applications using reconciliation protocols on ordered sets Contribution to a book, Contribution to a conference proceedings (2011) | Mayer, Daniel A. Neugebauer, Georg Meyer, Ulrike Wetzel, Susanne |
Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets Contribution to a book, Contribution to a conference proceedings (2011) | Mayer, Daniel A. Teubert, Dominik Wetzel, Susanne Meyer, Ulrike |
New Advances on Privacy-Preserving Policy Reconciliation Report (2010) | Meyer, Ulrike Wetzel, Susanne Ioannidis, Sotiris |
Security and privacy for mobile electronic health monitoring and recording systems Contribution to a book, Contribution to a conference proceedings (2010) | Barnickel, Johannes Karahan, Hakan Meyer, Ulrike |
Efficient mutual authentication for multi-domain RFID systems using distributed signatures Contribution to a book, Contribution to a conference proceedings (2010) | Braun, Michael Meyer, Ulrike Wetzel, Susanne |
Wireless Mesh Network security: State of affairs Contribution to a book, Contribution to a conference proceedings (2010) | Egners, André Meyer, Ulrike |
Sichere und energieeffiziente Mobilfunkkommunikation: Energieeffiziente Lösungen für sichere Datenübertragung in zukünftigen mobilen Kommunikationsgeräten Contribution to a book, Journal Article (2010) | Meyer, Ulrike Müller, Emmanuel Alexander Seidl, Thomas |
Compensation: Architecture for supporting dynamicity and negotiation in accounting, charging and billing Journal Article (2010) | Huitema, George Kuehne, Ralph Meyer, Ulrike Ensing, Henk Zugenmaier, Alf Bibas, Alain Karasti, Olavi Rumph, Frens Jan Siljee, Johanneke |
SecSyWiSe: A secure time synchronization scheme in wireless sensor networks Contribution to a book, Contribution to a conference proceedings (2009) | Barnickel, Johannes Meyer, Ulrike |